Skip to Content

Vulnerability Management

In the Vulnerability Management service, the LSAIT Infrastructure group scans for, identifies, reports on, and remediates any security vulnerabilities. This allows us to provide high-level of security support for the College. This includes patching operating systems and applications, scanning web sites to detect vulnerable code, and coordinating risk assessments and risk treatment plans.

Network Monitoring and Protection

The capability of devices to be mobile allows users the ability to utilize their systems in just about any computing environment available. A diverse and expansive computing landscape brings with it unique security challenges that may not always be apparent in a timely manner. The University of Michigan has in place an Intrusion Prevention System (IPS) to provide another layer of network security. This layer allows ITS to detect and prevent many types of malicious network traffic coming from outside the university before they reach our devices.

More information on the IPS is available at http://safecomputing.umich.edu/services/network-ips-faq.php.

Network Vulnerability Scanning

The LSA IT Infrastructure team conducts monthly network based vulnerability scans with a focus on identifying system weaknesses before they can be exploited. Each subnet scan results are reviewed, edited and formatted before providing to the appropriate department for corrective action. This venture also provides departments with valuable information ranging from systems that are new to their network to systems are utilizing out of date software versions.

Patch Management

To ensure College's systems are as secure as possible, the LSA IT Infrastructure team manages patch management systems for Windows and Red Hat operating systems. The College Windows Server Update Services (WSUS) server can deploy approved Microsoft-published updates to all authorized users quickly and efficiently. The Red Hat Satellite server handles providing approved updates for the College's Red Hat Enterprise Linux (RHEL) systems. This service ensures that updates are installed as silently as possible, requiring limited user interaction — almost "auto-magically."

Sensitive Data Scanning

Today's academic landscape requires researchers and facility to handle vast amounts of varying data sets that have the potential of containing sensitive information. LSA IT Infrastructure strives to identity, report and offer any assistance required to redact this information to ensure total compliance with all governing regulations.